Browse Definitions :


In physics, a hole is an electric charge carrier with a positive charge, equal in magnitude but opposite in polarity to the charge on the electron.   Holes and electrons are the two types of charge carriers responsible for current in semiconductor materials.

A hole is the absence of an electron in a particular place in an atom.  Although it is not a physical particle in the same sense as an electron, a hole can be passed from atom to atom in a semiconductor material.  Electrons orbit the nucleus at defined energy levels called bands or shells.  A hole forms in an atom when an electron moves from the so-called valence band (the shell outside the closed shells that is partially or completely filled with electrons) into the conduction band (the outer "cloud" from which electrons most easily escape from, or are accepted by, the atom).

Both electrons and holes are present in any semiconductor substance.  Electrons flow from minus to plus, and holes "flow" from plus to minus.  The more abundant charge carriers are called majority carriers; the less abundant are called minority carriers.  In N-type semiconductor material, electrons are the majority carriers and holes are the minority carriers.  In P-type semiconductor material, the opposite is true.

In the processing of semiconductors, the number of charge carriers can be increased by a process known as doping, which consists of adding minute amounts of elements called impurities.   Certain impurities, when added to a semiconducting element such as silicon, increase the number of electrons and produce an N-type material; other impurities increase the number of holes and produce a P-type material.  Both N-type and P-type material are important in the manufacture of solid-state electronic components.

This was last updated in May 2008



  • cyber attack

    A cyber attack is any attempt to gain unauthorized access to a computer, computing system or computer network with the intent to ...

  • backdoor (computing)

    A backdoor is a means to access a computer system or encrypted data that bypasses the system's customary security mechanisms.

  • post-quantum cryptography

    Post-quantum cryptography, also called quantum encryption, is the development of cryptographic systems for classical computers ...



  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...